Dropped Files | ZeroBOX
Name 24222300c78180b5_Trast.bat
Submit file
Filepath C:\Users\Public\Trast.bat
Size 34.0B
Processes 2620 (tud.exe)
Type ASCII text, with no line terminators
MD5 4068c9f69fcd8a171c67f81d4a952a54
SHA1 4d2536a8c28cdcc17465e20d6693fb9e8e713b36
SHA256 24222300c78180b50ed1f8361ba63cb27316ec994c1c9079708a51b4a1a9d810
CRC32 7F4F9BF9
ssdeep 3:LjTnaHF5wlM:rnaHSM
Yara None matched
VirusTotal Search for analysis
Name ceaa23efd7b371a5_nest
Submit file
Filepath C:\Users\Public\nest
Size 9.0B
Processes 2620 (tud.exe)
Type ASCII text, with CRLF line terminators
MD5 ddd1d042b744964739d9285f82a9cc5e
SHA1 a72ada2602f6b6fdc062df300a26b66aad744844
SHA256 ceaa23efd7b371a5642ad0e0e1635393b40cd3a7fb83c4eab93d30b2f8513702
CRC32 356C3A2C
ssdeep 3:/CB:k
Yara None matched
VirusTotal Search for analysis
Name b0f43b627353f91a_uogsnyk.exe
Submit file
Filepath C:\Users\Public\Libraries\Uogsnyk\Uogsnyk.exe
Size 748.5KB
Processes 2620 (tud.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 ce5d381161004cbbd80eaf1f37089cb2
SHA1 b9005e605fac55df470cde2b1ab0a1441fb1527f
SHA256 b0f43b627353f91afa5e4a9c5eea655f5375e497933a6e37c3c0f8a5a29a2889
CRC32 B2076E8B
ssdeep 12288:uEkuPF5S618CS6qkVdQOHvDc9aGKqa/yAXKQcj2SKI:uE/HS61uyswGKqXAzcR
Yara
  • PE_Header_Zero - PE File Signature
  • Malicious_Library_Zero - Malicious_Library
  • IsPE32 - (no description)
VirusTotal Search for analysis
Name 37c59c8398279916_KDECO.bat
Submit file
Filepath C:\Users\Public\KDECO.bat
Size 155.0B
Processes 2620 (tud.exe)
Type ASCII text, with no line terminators
MD5 213c60adf1c9ef88dc3c9b2d579959d2
SHA1 e4d2ad7b22b1a8b5b1f7a702b303c7364b0ee021
SHA256 37c59c8398279916cfce45f8c5e3431058248f5e3bef4d9f5c0f44a7d564f82e
CRC32 42292F53
ssdeep 3:LjT5LJJFIf9oM3KN6QNb3DM9bWQqA5SkrF2VCceGAFddGeWLCXlRA3+OR:rz81R3KnMMQ75ieGgdEYlRA/R
Yara None matched
VirusTotal Search for analysis
Name f35f2658455a2e40_UKO.bat
Submit file
Filepath C:\Users\Public\UKO.bat
Size 250.0B
Processes 2620 (tud.exe)
Type ASCII text, with CRLF line terminators
MD5 eaf8d967454c3bbddbf2e05a421411f8
SHA1 6170880409b24de75c2dc3d56a506fbff7f6622c
SHA256 f35f2658455a2e40f151549a7d6465a836c33fa9109e67623916f889849eac56
CRC32 8C4E367F
ssdeep 6:rgnMXd1CQnMXd1COm8hnaHNHIXUnMXd1CoD9c1uOw1H1gOvOBAn:rgamIHIXUaXe1uOeVqy
Yara None matched
VirusTotal Search for analysis
Name 088543fb9f1da51a_kynsgou.url
Submit file
Filepath C:\Users\Public\Libraries\kynsgoU.url
Size 96.0B
Processes 2620 (tud.exe)
Type MS Windows 95 Internet shortcut text (URL=<file:"C:\\Users\\Public\\Libraries\\Uogsnyk\\Uogsnyk.exe">), ASCII text, with CRLF line terminators
MD5 bad0e6ba46d8900a8a43fa1e6a0fc9f8
SHA1 40db8e54e493095cf15ba17dae31ecb8dc7f8c8e
SHA256 088543fb9f1da51a2f50c894190cd46d6757ce7e603756acb5611c5c509c292d
CRC32 9845DC82
ssdeep 3:HRAbABGQYmTWAX+rSF55i0XMmd+KWokAEysGKd7ovn:HRYFVmTWDyzPdRWoJEysb7yn
Yara None matched
VirusTotal Search for analysis
Name 45aa3957c2986526_nest.bat
Submit file
Filepath C:\Users\Public\nest.bat
Size 53.0B
Processes 2620 (tud.exe)
Type ASCII text, with CRLF line terminators
MD5 8ada51400b7915de2124baaf75e3414c
SHA1 1a7b9db12184ab7fd7fce1c383f9670a00adb081
SHA256 45aa3957c29865260a78f03eef18ae9aebdbf7bea751ecc88be4a799f2bb46c7
CRC32 989CB101
ssdeep 3:LjT9fnMXdemzCK0vn:rZnMXd1CV
Yara None matched
VirusTotal Search for analysis